Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
Open Access
- 1 January 2021
- journal article
- research article
- Published by Scientific Research Publishing, Inc. in Journal of Information Security
- Vol. 12 (01), 79-103
- https://doi.org/10.4236/jis.2021.121004
Abstract
Data Migration is a multi-step process that begins with analyzing old data and culminates in data uploading and reconciliation in new applications. With the rapid growth of data, organizations constantly need to migrate data. Data migration can be a complex process as testing must be done to ensure data quality. Migration also can be very costly if best practices are not followed and hidden costs are not identified in the early stage. On the other hand, many organizations today instead of buying IT equipment (hardware and/or software) and managing it themselves, they prefer to buy services from IT service providers. The number of service providers is increasing dramatically and the cloud is becoming the preferred tool for more cloud storage services. However, as more information and personal data are transferred to the cloud, to social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. So, academia and industry circles strive to find an effective way to secure data migration in the cloud. Various resolving methods and encryption techniques have been implemented. In this work, we will try to cover many important points in data migration as Strategy, Challenges, Need, methodology, Categories, Risks, and Uses with Cloud computing. Finally, we discuss data migration security and privacy challenge and how to solve this problem by making improvements in it’s using with Cloud through suggested proposed model that enhances data security and privacy by gathering Advanced Encryption Standard-256 (ATS256), Data Dispersion Algorithms and Secure Hash Algorithm-512. This model achieves verifiable security ratings and fast execution times.Keywords
This publication has 13 references indexed in Scilit:
- ESSAO: Enhanced Security Service Algorithm using Data Obfuscation Technique to Protect Data in Public Cloud StorageIndian Journal of Science and Technology, 2016
- Cloud ComputingPublished by Taylor & Francis Ltd ,2016
- Secure personal cloud storagePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- EncryScation: A novel framework for cloud IaaS, DaaS security using encryption and Obfuscation techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloudPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Framework for client side AES encryption technique in cloud computingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- A 3-level re-encryption model to ensure data protection in cloud computing environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Data migration: A theoretical perspectiveData & Knowledge Engineering, 2013
- A Study of the Use of IDAs in Cloud StorageInternational Journal of Future Computer and Communication, 2013
- Relative information capacity of simple relational database schemataPublished by Association for Computing Machinery (ACM) ,1984